Digital Edition

SYS-CON.TV
Remember These Two Important Facets of Cloud Monitoring for the Enterprise
The first important aspect of cloud monitoring is called cloud discovery

As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I'm referring to the process of identifying cloud use within an organization and then evaluating if there are data privacy and/or compliance risks that need to be mitigated. Cloud monitoring includes the idea of fully understanding what clouds are being used and how employees are accessing and updating information, from where and when. This becomes more complicated with the proliferation of BYOD policies as well as the growing trend of Shadow IT groups within corporations that assist business units in deploying clouds without "Official" IT knowing about it. But steps can still be taken to manage the operational and legal risks associated with sending sensitive data outside of the corporation's firewall while simultaneously enabling operating units to use the cloud as required to drive business results.

Cloud Discovery
The first important aspect of cloud monitoring is called cloud discovery - which is simply getting a better handle on what clouds are being accessed from within your organization on a daily basis. Many cloud programs are large, have significant budgets and broad governance and oversight (companywide deployments of HR applications like SuccessFactors as an example). But some use is individual and/or department based (such as Box or DropBox), and IT professionals need a way to identify this cloud use as a first step to ensuring it is being used in a compliant fashion.

Cloud Visibility and Analysis
Another important facet of cloud monitoring is cloud visibility (or cloud analysis), which primarily means giving organizations a clearer look into how the clouds accessed from within their enterprise are being used. Which individuals or teams are accessing what specific types of data and documents... this needs to be understood by members of IT, Risk and Security so the appropriate controls can be put in place to protect the enterprise. An additional benefit of Visibility and Analysis tools is in the area of SLA auditing. Organizations can use the information now at their disposal to measure how effective cloud providers are being in providing contracted levels of service.

Completing the Picture - Protecting Non-Compliant Cloud Use
The last step of a successful cloud monitoring program needs to focus on ensuring that enterprise cloud use remains compliant with corporate guidelines (which are informed by internal security policies and any applicable regulatory guidelines). Some cloud use may not require any additional security protocols, but others likely will. Enterprise Security and IT teams can take multiple approaches to securing their data on the cloud while permitting appropriate access by their corporate users. It means being able to anticipate issues and proactively address them while enabling uninterrupted use of the most popular cloud services. Solutions such as those highlighted in Gartner's Cloud Access Security Broker framework can be particularly helpful here, including Cloud Data Control Gateways (i.e., Cloud Encryption Gateways) that can be used to encrypt or tokenize sensitive data before it goes to the cloud for processing and storage.

To learn more about how PerspecSys is helping enterprises address cloud security challenges associated with moving to the public cloud, visit the "Cloud Security" section of our website.

Read the original blog entry...


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit perspecsys.com or follow on Twitter.

About Gerry Grealish
Gerry Grealish is Vice President, Marketing & Products, at PerspecSys. He is responsible for defining and executing PerspecSys’ marketing vision and driving revenue growth through strategic market expansion and new product development. Previously, he ran Product Marketing for the TNS Payments Division, helping create the marketing and product strategy for its cloud-based payment gateway and tokenization/encryption security solutions. He has held senior marketing and leadership roles for venture-backed startups as well as F500 companies, and his industry experience includes enterprise analytical software, payment processing and security services, and marketing and credit risk decisioning platforms.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

The explosion of new web/cloud/IoT-based applications and the data they generate are transforming ou...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
Enterprises are striving to become digital businesses for differentiated innovation and customer-cen...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't com...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, wi...
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO ...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in developm...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with e...
In this presentation, you will learn first hand what works and what doesn't while architecting and d...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitori...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide ...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear...
We build IoT infrastructure products - when you have to integrate different devices, different syste...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling ...